Yuewei Dai
Nanjing University of Science and Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Yuewei Dai.
Signal Processing | 2008
Jinwei Wang; Guangjie Liu; Yuewei Dai; Jinsheng Sun; Zhiquan Wang; Shiguo Lian
With the increasing demands of copyright protection, watermarking technology has being paid more and more attention. In the design of watermarking algorithm, a good watermark detection scheme can improve the successful detection rate, which pushes more and more researchers to work on optimum detectors. In this paper, with respect to Barnis multiplicative watermarking that is based on human visual system (HVS), the optimum detection using Bayesian decision rule is firstly proposed. The decision threshold is obtained by the NP criterion. The probability density function of the transform coefficients is modeled by using the generalized Gaussian distribution. Its simplification equation is given using Gaussian distribution. It can result in a better performance than correlation detection.
international conference on multimedia information networking and security | 2009
Junwen Wang; Guangjie Liu; Hongyuan Li; Yuewei Dai; Zhiquan Wang
Due to the widespread use of sophisticated imaging tools, digital image forgeries have already become a serious social problem. In this paper, we proposes an efficient and robust algorithm for detection of a specific category of digital image forgery known as region duplication forgery, which is done by copying a block of an image and pasting it on to some other block of the same image. The image is first reduced in dimension by Gaussian pyramid, and four features are adopted for each circle block. The feature vectors are lexicographically sorted. Then similar vectors will be matched by a certain threshold value. Finally, the area threshold value is proposed to remove the wrong similar blocks. Experimental results show that our method is robust to not only the post processing including noise adding, blurring, lossy compression, but also the copy region rotation. Meanwhile, the proposed method reduces the total number of blocks to narrow block-matching searching space, which can improve the efficiency comparing with the exiting methods.
international conference on control, automation, robotics and vision | 2004
Shiguo Lian; Jinsheng Sun; Zhiquan Wang; Yuewei Dai
Video encryption is a suitable method to protect video data. There are some disadvantages in the algorithms proposed before. In this paper, we propose a novel fast MPEG video encryption algorithm, which encrypts run length codes with chaotic run-length encryption algorithm (CREA), encrypts the signs of motion vectors with security-enhanced chaotic stream cipher (SECSC) and distributes keys with chaotic key distributor (CKD) at the same time. Its security, compression ratio and computational complexity are analyzed in details. Experimental results show that, the algorithm has less effect on compression ratio than the algorithms confusing DCT coefficients do, does not change file format, and is of low cost. Thus, it is suitable for secure video encoding with real-time requirement.
Mathematical and Computer Modelling | 2013
Guangjie Liu; Junwen Wang; Shiguo Lian; Yuewei Dai
Abstract In this paper, a novel method is proposed to detect image splicing with artificial blurred boundary based on image edge analysis and blur detection. Different from existing algorithms, the image edges are divided into three types based on the coefficients of the non-subsampled contourlet transform. And, the six-dimensional feature of each edge point is extracted, which is composed of two non-subsampled contourlet coefficients and four statistics based on the phase congruency. Then, three support vector machines for each edge type are trained and used to detect the blurred edge points. And, the local feature is defined to distinguish artificial blurred edge points from defocus ones. The proposed method can be used to detect either the image blur or the image splicing with artificial blurred boundary, and it is shown by experimental results.
international conference on multimedia information networking and security | 2011
Guangjie Liu; Weiwei Liu; Yuewei Dai; Shiguo Lian
In this paper, an adaptive matrix embedding method is proposed for grayscale images. The 2×4 pixel block is taken as a cover unit. The local correlation of the block is used to determine the message bit amount and choose the corresponding matrix embedding strategy. The method can embed less in image parts with high local correlation and more in image parts with low local correlation. The experimental results indicate that the new method improves the PSNR value greatly. And the new method is secure against the traditional steganalytic method.
Telecommunication Systems | 2012
Guangjie Liu; Jiangtao Zhai; Yuewei Dai
Network covert timing channel is a communication fashion that modifies the timing properties of network traffic to transfer secret information. It is designed to carry out the reliable and undetectable transmission. In this paper, a simple and secure covert timing channel method with distribution matching is proposed. The approach treats the network traffic as the flow with the fixed-length fragment, and calculates the histogram of the packet delays in each fragment. The message bits are modulated into the delays by the binary coding method, and the histogram is kept almost unchanged by assigning the matched distribution. The bit error rates are analyzed and two detection experiments are performed. The results show the proposed method is reliable and undetectable.
international conference on multimedia information networking and security | 2010
Junwen Wang; Guangjie Liu; Hongyuan Li; Yuewei Dai; Zhiquan Wang
In this paper, a novel image forensics method is proposed to detect manual blurred edges from a tampered image. Firstly, the image edges are analyzed by using non-subsampled contourlet transform. Then the differences between the normal edge and the blurred edge are extracted by researching phase congruency and prediction-error image. After that, the features are used to train the SVM, by which the blurred edges can be distinguished. Finally, the local definition is introduced to indicate the differences between the manual blur and defocus ones. Experimental results show that this method can detect possible blurring in images and locate the tampering boundary with a relative high accurate rate.
Journal of Multimedia | 2010
Guangjie Liu; Zhan Zhang; Yuewei Dai; Shiguo Lian
In the paper, for enhancing the security of the traditional LSB matching, two improved LSB-matching methods are proposed. In the steganograhical procedure, the Markov chain distance based on the second-order statistics is chosen as the security metric to control the modification directions of ±1 embedding. The first method is based on stochastic modification, which directly determines the modification directions by the empirical Markov transition matrix of a cover image and the pseudorandom number generated by a pseudorandom number generator. The second one is based on genetic algorithm, which is used to find the optimum matching vector to make the security metric as small as possible. Experiments show the proposed algorithms outperform LSB matching and LSB replacement in a sense of the firstorder and second-order security metrics. And the adjacent calibrated COM-HCF steganalytical tests also show that the two algorithms are more secure than the traditional ones.
Security and Communication Networks | 2011
Huawang Qin; Yuewei Dai; Zhiquan Wang
An identity-based threshold signcryption scheme for multiple receivers is proposed. For the n specified receivers, the ciphertext can be decrypted and verified when arbitrary t or more receivers work together. The steps of the private keys extraction, the signcryption, the decryption, and the verification are introduced in detail. The chosen-ciphertext security of the scheme is proved formally. The comparisons to the existing schemes show that the proposed scheme is more secure, more flexible, and the simulative game of the security proof in the scheme is more perfect. Copyright
international conference on multimedia information networking and security | 2010
Jiangtao Zhai; Guangjie Liu; Yuewei Dai
Covert channels are used for transmitting secret information, which can penetrate the existing security equipments and bring potential dangers up to the information security. So, it’s very essential to develop the correspondent detection algorithms. In the paper, the potential redundancies in TCP protocol are analyzed, and the covert channel algorithms are divided into several kinds according to TCP protocol. And then, a new covert channel detection method is proposed based on the TCP Markov model for different application scenarios. Experiments show that the proposed algorithm achieves sound detection performance.